FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R13 2019 December 814AT Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R13 2019 December 814AT Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Code No: 814AT

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by‌ FirstRanker.com ---

MCA IV Semester Examinations, December - 2019
INFORMATION SECURITY
Time: 3 Hours Max. Marks: 60

Note: This question paper contains two parts A and B.
Part A is compulsory which carries 20 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 8 marks and may have a, b, c as sub questions.

--- Content provided by​ FirstRanker.com ---

PART - A 5 x 4 Marks =20

  1. Explain different kinds of security approaches. 4
  2. Describes the Diffie- Hellman key exchange technique. 4
  3. Discuss the techniques of public key certificates for distribution of public keys. 4
  4. Compare and contrast the key management in PGP and S/MIME. 4
  5. --- Content provided by‍ FirstRanker.com ---

  6. Explain the operation of secure socket layer in detail. 4

PART -B 5 x 8 Marks =40

  1. a) Consider the following:
    Plaintext: “KEY”
    Secret key: “CRYPTOGRAPHY”

    --- Content provided by​ FirstRanker.com ---

    Compute the cipher text from given plain text and key using hill cipher method.
    b) Give an overview of various security services. [4+4]

    OR

    Explain symmetric and asymmetric key cryptography. [8]
  2. Apply the mathematical foundations of RSA algorithm. Perform encryption decryption for the following data, p=17, q=7, e=5, n=119, message = “6”. Use extended Euclid's algorithm to find the private key. [8]

    OR

    a) With a neat diagram; explain about the multiple encryptions (Triple DES with two and three keys).

    --- Content provided by‍ FirstRanker.com ---

    b) Briefly explain RC4 algorithm. [4+4]
  3. Describe digital signature algorithm and show how signing and verification is done using DSS. [8]

    OR

    a) X.509 includes three alternative authentication procedures, what are these three procedures? Explain them in brief.
    b) Explain in detail about MAC algorithms and its requirements. [4+4]
  4. What do you mean by Security Association? Specify the parameters that identify the Security Association.

    --- Content provided by⁠ FirstRanker.com ---

    Summarize about the authentication header of IP and discuss about encapsulating security payload of IP. [4+4]

    OR

    a) Explain the general format of Pretty Good Privacy Message.
    b) Discuss the architecture of IP security. [4+4]
  5. Explain the different types of firewalls with neat diagrams. [8]

    OR

    a) List and explain the major classes of intruders.

    --- Content provided by⁠ FirstRanker.com ---

    b) Describe Secure Electronic Transaction for E- Commerce transaction with neat diagram. [4+4]

FirstRanker.com



--- Content provided by FirstRanker.com ---

This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university